• Title/Summary/Keyword: 계층분석절차

Search Result 136, Processing Time 0.034 seconds

Decision Making for Priority of Water Allocation during Drought by Analytic Hierarchy Process (계층분석과정(AHP)에 의한 가뭄시 용수배분 우선순위 위사 결정)

  • Lee, Hyun-Jae;Shim, Myung-Pil
    • Journal of Korea Water Resources Association
    • /
    • v.35 no.6
    • /
    • pp.703-714
    • /
    • 2002
  • During drought, there have been a number of conflicts because of the limited and insufficient water to allocate for the numerous water users. To solve the problems, the decision on the priority of water use should be made with social rationality A rational and systematic procedure needs to be implemented in order to decide the priority of water use. First, a criteria level is made of the main and detailed drought impacts which come from the economic, environmental, and social aspects. Four alternatives are then identified for priority of water use. Second, survey to the two group(professional, residents) has been done with using pair wise comparisons. Finally, the relative weights and the priority of alternatives are determined by means of the Analytic Hierarchy Process(AHP) which is one of the Multi-Attributed Decision Method(MADM). By using AHP, it has been concluded that the water allocation during drought should be accomplished in order of domestic, irrigation, industrial, and river maintenance water. If the AHP method were improved for inconsistency which may be generated with survey analysis, a number of applications will be used for the solutions of problem in water resources systems.

A Study on the Security Structure and Authenitication Procedure in ATM (ATM 망에서의 정보보호 구조 및 인증절차에 관한 연구)

  • Sin, Hyo-Yeong;Yu, Hwang-Bin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.107-114
    • /
    • 1999
  • Recently as services in ATM are diversified, the need for security has been increased, But when we added the security features in ATM, the Compatibility and transparency with existing systems must be considered after analyzing threats of security. This paper designs the security protocol in ATM protocol stack and defines the primitivies and processing procedure of messages which are need in the security layer. Also, this paper presents the authentication and key distribution procedure which can be adopted at call establishment. The presented authentication protocol can be used for point-to-point method as well as point-to-multipoint method. and the correctness of this protocol is verified using GNY logic.

  • PDF

Analysis on Socioeconomic Characteristics of Collegiate' Sport Participation (대학생의 사회 인구학적 특성에 따른 스포츠 참여도 분석)

  • Shin, Jwa-Jung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.120-123
    • /
    • 2006
  • The purpose of this study is to examine closely between the sociodemographic characteristics and sports participation. To subject who answered to givev questionaire was 389 persons. To analyze materials, $X^2$ analysis used as statistic analysis techniques. On the basis of the results, the conclusions were as follows; Firstly, there was significants relationship between sex and sports participation. Secondly, there was significants relationship between college & department and sports participation. Thirdly, there was not significants relationship between house income and sports participation. Lastly, there was not significants relationship between subjective social-class and sports participation.

  • PDF

Prioritization of Information and Communication Technologies for Strategic Standardization (정보통신 중점기술의 표준화 우선순위 결정방법)

  • Koo, Kyoung-Cheol;Woo, Hoon-Shik;Jo, In-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.1-8
    • /
    • 2011
  • To visualize a strategic plan including resource allocations and standardization schedules, it is important to set priorities among information and communication technologies(ICTs) standardization work areas(SWAs). This ranking process involves decision making process with multiple criteria which results a complex selection problem. In this study, analytic hierarchy process(AHP) is employed and applied to solve this decision making problem. The processes and results are illustrated for an effective strategic plan in standardization decision processes.

Performance Analysis on Code-Division Multiple Access in Underwater Acoustic Sensor Network (수중 음향 센서 망에서의 코드 분할 다중 접속 기법에 대한 성능 해석)

  • Seo, Bo-Min;Cho, Ho-Shin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9A
    • /
    • pp.874-881
    • /
    • 2010
  • Acoustic signal, which is a main carrier of underwater communication, attenuates along the traveled path heavily depending on the frequency as well as inter-node distance. In addition, since it has a long propagation delay, the conventional medium access control (MAC) schemes requiring complex signaling procedures and accordingly heavy overhead messages would not be appropriate in underwater communications. In this paper, we propose a code division multiple access (CDMA) scheme as a solution for MAC of underwater communication and evaluate the performance. A hierarchical data-gathering tree topology is considered and a staggered wake-up pattern is employed for the purpose of energy saving. As a performance measure, the data rate at each level of hierarchical topology is derived.

The Implementation of Korean Morphological Analyzer Using Hierarchical Symbolic Connectivity Information (계층적 기호 접속정도를 이용한 한국어 형태소 분석기의 구현)

  • Lee, Eun-Chul;Lee, Jong-Hyeok
    • Annual Conference on Human and Language Technology
    • /
    • 1992.10a
    • /
    • pp.95-104
    • /
    • 1992
  • 본 논문은 구문해석, 의미해석 등의 전처리 단계로서의 형태소 분석기 구현에 대해 기술하고자 한다. 먼저 기존의 접속정보의 단점을 보완하는 새로운 접속정보를 정의한다. 이 접속정보는 계층적구조를 가지고 심볼로써 표현되며, 기존의 좌우 두 가지 접속정보를 사용한 방법과는 달리 좌우를 하나로 통합한 정보를 사용한다. 따라서 접속정보 유지와 확장에 편의를 제공해 주고 접속정보 부여시 정확성을 더할 수 있고, 계층적구조를 살려서 접속정보표의 구성을 용이하게 한다. 또한 불규칙활용에 있어서는 사전정보에 의한 선언적 방법과 프러시져에 의한 절차적 방법의 장점을 살려 혼용하였다. 끝으로 앞에서 정의된 새로운 접속정보 방식의 장점을 살려서 정확한 분석 결과를 얻을 수 있는 형태소 분석기의 구현에 대해 설명한다.

  • PDF

Optimal Design of Bank Protection Work Using Analytic Hierarchy Process (계층분석과정을 이용한 최적 호안공법 선정)

  • Lee, Jae-Mun;Lee, Sang-Il
    • Journal of Korea Water Resources Association
    • /
    • v.41 no.6
    • /
    • pp.619-628
    • /
    • 2008
  • Bank protection is a structure constructed to protect directly embankment breakage and erosion by river flow. Traditionally, the type of bank protection has been decided by practitioner's subjective and empirical judgement, which often causes problems after construction. Recently, however, it becomes important to consider not only physical protection but also environment. Various types of bank protection for environment-friendly river are now available. Thus, there is a need for more objective and quantitative decision method for bank protection work. This study adopts the analytic hierarchy process (AHP) to improve the objectiveness in the decision of bank protection work. Criteria for stability, economy, construction, environment are identified and a standardized process is presented for field application. With the proposed method, one can prioritize various bank protection works and make the optimal decision. We believe that the method can serve as a useful tool for river engineers in practice.

The Evaluation Perspective of Stream Weight in AHP (계층분석법을 이용한 하천의 중요도 평가기법)

  • Park, Tae-Sun
    • Journal of Korea Water Resources Association
    • /
    • v.35 no.6
    • /
    • pp.685-692
    • /
    • 2002
  • It is very useful to estimate easily the various characteristics of streams and to manage objectively streams, as the order or grade among streams is determined by the natural characteristics and the degree of human utilization. With obtainable various statistics data and expert examination, we proposed the measurable evaluation index of "stream weight" considering the natural characteristics of streams, the utilization degree of streams and the social conditions of the regions crossed streams. The each stream weight is calculated as follows. Firstly, select the various factors which influence to streams in AHP. Secondly, determine the each weight of factors by the result of expert examination. Finally, sum up after multiplying the normalized factors by these two values. The stream weight can be used such divisions as the recognization of relative weight between streams, the determination of the stream management direction in the near future, the enhancement of the efficiency of stream management through the adjustment of the present stream grade and the determination of the management method concerned the stream weight as well.t as well.

CASE Tool을 이용한 Safety Critical 소프트웨어 개발 방법론

  • 김장열;권기춘
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1996.05a
    • /
    • pp.446-450
    • /
    • 1996
  • 본 논문은 Computer Aided Software Engineering (CASE) Tool을 이용할 경우의 Safety Critical 소프트웨어 개발 방법론인 구조적 분석 및 구조적 설계 모델링 방법론을 Teamwork CASE tool의 예를 중심으로 제안하고자 한다. 제시된 사례는 NSIS(Nuclear Safety Information System)으로서 Essential Modeling과 Implementation Modeling을 제시하였는데 Teamwork CASE 환경하에서의 분석 및 설계 절차, 지침 등을 제시하였다. Essential Modeling에서는 NSIS의 MMIS 분석범위 및 External Interface를 제시하는 환경 모델(Environmental Model)과 MMIS의 기능을 계층구조적으로 분할하는 행위모델링(Behaviroal Modeling)을 각각 Context Diagram과 Data Flow Diagram (DFD)으로 그 과정을 제시하였다. Implementation Modeling에서는 Essential Modeling으로 부터 나온 결과물을 토대로 Boss Rule, Transform Rule과 Transaction Rule 등을 거쳐 NSIS MMIS의 설계 근간이 되는 Structured Chart(SC)를 제시하였다. 본 논문에서 제시된 모델링 방법론을 통하여 Safety Critical 소프트웨어 개발시 Teamwork CASE Tool을 활용할 수 있음과 동시에 분실 및 설계의 일치성을 통하여 Safety Critical 소프트웨어의 안전성 확립과 품질보증 목표에 기여할 수 있다.

  • PDF

Analysis of Digital Divide in Transportation Section (교통부문 디지털 격차 현황 분석)

  • Ah-hae Cho;Jihun Seo;Jungwoo Cho;Sunghoon Kim;Youngho Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.4
    • /
    • pp.145-166
    • /
    • 2023
  • The ongoing COVID-19 pandemic has led to a widespread shift towards non-face-to-face/uncrewed services in various sectors of society. Despite this, research on the digital divide has focused predominantly on analyzing various factors, with the notable absence of studies addressing the digital divide. Therefore, study examined the current digital divide in the transportation sector through a survey-based approach. First, a nationwide survey was conducted among adult men and women to assess their digital device usage. Vulnerable groups sesceptible to digital disparities were identified based on factors such as age, education, and income. Second, comparative analysis was conducted to examine the usage patterns of mobile applications related to the transportation sector among the vulnerable and non-vulnerable groups using chi-squared test. These findings suggest that the vulnerable group exhibited lower awareness and preference for mobile applications, a significantly lower frequency of application usage than the non-vulnerable group. Finally, a comparison of the proficiency in utilizing transportation sector mobile applications was conducted, showing that the vulnerable group demonstrated a significantly lower level of proficiency across all aspects of application usage procedures compared to the non-vulnerable group. These survey results provide a valuable foundation for future policy formulation to reduce the digital divide in the transportation sector. By highlighting the current state of digital disparities, the research contributes to developing evidence-based strategies to enhance inclusivity and equal access to digital services in tjwtransportation.